06.01.2013 Views

Download PDF - IBM Redbooks

Download PDF - IBM Redbooks

Download PDF - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Index<br />

Numerics<br />

5 nines 105<br />

A<br />

access types 47<br />

ACS routines for SAP 177<br />

ADMIN stored procedures 45<br />

AIX 54<br />

application server instance 10, 12<br />

architecture of SAP NetWeaver with DB2 for z/OS 9<br />

AT-TLS policies 129<br />

audit policy 117, 119<br />

audit reports 120<br />

availability 105<br />

enhancements 37<br />

B<br />

backup 89<br />

installation considerations 191<br />

recovery management 89<br />

Backup Monitor 89<br />

bare metal 108<br />

BSDS SMS consideration 179<br />

buffer pools 87<br />

business continuity 17<br />

software considerations 166<br />

business value 6<br />

C<br />

CA certificate 126<br />

CAT 177<br />

catalog contention 32<br />

CCMS (Computing Center Management System) 83<br />

central services instance 11<br />

CI 178<br />

Collaborative Memory Management 102<br />

Computing Center Management System (CCMS) 83<br />

configuration<br />

PAGENT policy agent 128<br />

SAP installation 57<br />

SAPCL 65<br />

temporary space in SAP 176<br />

z/OS UNIX System Services 170<br />

z/VM monitoring 97<br />

connection trust attributes 133<br />

continuous availability 17<br />

continuous operation 17<br />

Cooperative Memory Management 102<br />

D<br />

data set protection 138<br />

data sharing 20<br />

considerations 72<br />

GDPS 21<br />

group 106<br />

member 106<br />

database administration guide 148<br />

database administrator 146<br />

separation of duties 114<br />

database instance 12<br />

Database Job Central Planning 89<br />

database roles feature 132<br />

database server 20<br />

DB2<br />

active logs, SMS consideration 179<br />

backup preparations 191<br />

data sharing and GDPS 21<br />

installation parameters 73<br />

migration considerations 67<br />

preparation for, installing, and customization 173<br />

SAP 2<br />

subsystem activity 84<br />

subsystem, building for SAP 173<br />

System z 2<br />

DB2 10<br />

audit policy 117<br />

database server, data stream encryption 124<br />

dataset protection 138<br />

DRDA secure port for SSL 131<br />

installation and migration 53<br />

performance and processor efficiency 34<br />

remote trusted connection 134<br />

scalability improvements 32<br />

security enhancements 113<br />

trusted security context and roles 132<br />

using SSL 126<br />

Virtual Storage Constraint Relief 31<br />

virtual storage constraint relief 31<br />

ZPARMS for SAP 190<br />

DB2 Connect 15<br />

DB2 VSAM data sets 177<br />

DBA Cockpit 83<br />

changes 40<br />

DBADM authority 115–116<br />

DBM1 monitoring 42<br />

DEF_CURR_DEGREE 51<br />

demilitarized zone 13<br />

DFSMS storage management 177<br />

dialog instances 12<br />

direction 130<br />

documentation 148<br />

collections and sources 148<br />

<strong>IBM</strong> 153<br />

migration 67<br />

SAP 150<br />

downtime 105<br />

DRDA secure port for SSL 131<br />

© Copyright <strong>IBM</strong> Corp. 2012. All rights reserved. 201

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!